US20110252140A1 - Method for establishing a link between the applications of an authentication card of a subscriber and an ims network - Google Patents
Method for establishing a link between the applications of an authentication card of a subscriber and an ims network Download PDFInfo
- Publication number
- US20110252140A1 US20110252140A1 US13/126,904 US200913126904A US2011252140A1 US 20110252140 A1 US20110252140 A1 US 20110252140A1 US 200913126904 A US200913126904 A US 200913126904A US 2011252140 A1 US2011252140 A1 US 2011252140A1
- Authority
- US
- United States
- Prior art keywords
- card
- terminal
- ims
- server
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
Definitions
- the field of the invention is that of mobile telecommunications systems and more particularly relates to an improvement brought in a standardized architecture known as IMS (IP Multimedia Subsystem).
- IMS IP Multimedia Subsystem
- IMS architecture makes it possible to supply the users of telecommunications networks of the GSM, GPRS or UMTS types with fixed and mobile multimedia services.
- This system uses the VoIP (Voice over IP) technology based on a standardized 3GPP implementation of SIP (Session Initiation Protocol) operating in a standard IP (Internet Protocol) protocol.
- VoIP Voice over IP
- SIP Session Initiation Protocol
- IP Internet Protocol
- IMS architecture supplies an intermediate layer in the core of networks for switching from the conventional mode (circuit mode) to the session mode. In other words, it makes it possible to open several sessions during the same communication.
- IMS makes it possible to mix multimedia components, for example adding a chat session to video or sending a photograph during a phone call. Starting a video session during a call is also possible, using IMS.
- An IMS connection is conventionally established by the user's mobile terminal. Requesting a data channel from the IMS network establishes a secured IP connection and it is then possible to send and to receive any type of data via this channel.
- the 3GPP TS 33.203 standard discloses the characteristics and the security mechanisms aiming at securing the accesses to an IMS server and more particularly how the SIP signalling is protected between the user-subscriber and the IMS server, how this subscriber is authentified and how the subscriber authentifies the IMS server.
- An IMS-implementing mobile terminal thus establishes a secured channel with the IMS server and protects the communications of data with the server.
- the IMS server and the subscriber make a mutual authentication and tap keys. Tapped keys are used for establishing a secured channel between the subscriber and the IMS server.
- the secured channel can be established using an IP-SEC (acronym for IP—secured Internet channel) as described in 3GPP TS 33.203.
- IMS can be operated with any type of networks (fixed, mobile or wireless), including the packets switching functions, such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable. Older circuit switching systems (POTS, GSM) are supported by gateways. Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
- networks fixed, mobile or wireless
- packets switching functions such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable.
- POTS, GSM Global System for Mobile Communications
- GSM Global System for Mobile communications
- Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
- the IMS channel is totally managed by the user's (generally mobile) terminal, typically composed of a portable telephone or a Smartphone (portable telephone coupled with a PDA).
- the terminal initiates and manages communication on the IMS channel.
- the terminal switched to the IMS mode has a particularity in that it encrypts the data it sends and decrypts the data it receives from the IMS server.
- the thus generated physical channel is called an IP-SEC channel.
- a mobile terminal conventionally includes a card (SIM in a 2G network or UICC with a USIM aboard, in a 3G network) making it possible to authentify the user in the network.
- SIM in a 2G network or UICC with a USIM aboard, in a 3G network
- the card only plays a part in the authentication and the generation of keys giving access to the IMS networks. But the card, in the present state of the art, has no role to play when the terminal is switched to the IMS mode.
- the drawback of this solution is that, if applications, for example an on-line game application or a bank application (for example enabling to pay with his/her mobile terminal), exist in the card, these cannot use the IMS channel since the access to the IMS network requires an authentication and the information transmitted between the IMS terminal and the card are encrypted. Since appropriate security mechanisms cannot be implemented, the card applications cannot be considered as IMS applications. For example, a user will not be allowed to make a payment from his/her mobile terminal while conversing (through a conventional voice channel) with the shopkeeper, if the payment application is totally implemented in the card.
- the object of the present invention is to provide solutions making it possible to store and to execute IMS applications in the SIM card.
- one object of the present invention is to allow a user to operate the applications existing in the card from his/her mobile terminal, with the data resulting from such (in-coming or out-going) applications transiting between the card and the server via an IP-SEC channel, and thus in IMS mode, without increasing the number of available IP-SEC channels in the network.
- the sharing of resources is provided by a proxy server aboard the terminal.
- the proxy can use the SIP language used by the IMS applications.
- the sharing of resources is provided by a system of the IP battery type serializing the IP packets transmitted and received by the terminal and the card.
- An application implementing a service for discovering the security parameters used for the connection between the mobile and the IMS network is used in the terminal.
- FIG. 1 represents a first embodiment of the method according to the invention
- FIG. 2 represents a second embodiment of the method according to the invention.
- FIG. 1 represents a first embodiment of the method according to the invention.
- a proxy server is used as an interface between the terminal and the card.
- a proxy is a data server, the function of which consists in relaying requests between two stations (for example, a client station and a server).
- a terminal 10 typically a mobile telephone terminal has a subscriber's authentication card 11 , typically an UICC card (acronym for Universal Integrated Circuit Card).
- the card 11 guarantees the integrity and the security of all the types of personal data. Knowingly, it more particularly includes SIM applications in a GSM network and/or USIM applications in a UMTS network.
- the card 11 also conventionally includes a processor, ROM, RAM and EEPROM memories, as well as an I/O interface circuit with the terminal 10 . It further includes an ISIM Module (IP Multimedia Services Identity Module).
- ISIM Module IP Multimedia Services Identity Module
- the user of the terminal 10 is in radio communication (voice channel not shown) with another user. Knowingly and as previously disclosed, the terminal 10 is able to request the opening of an IMS channel 12 from an IMS server 13 .
- the channel 12 corresponds to the previously mentioned secured IP-SEC channel.
- the terminal 10 contains one application providing the encryption of data, which it sends to the server 13 and the decryption of data received by this server 13 .
- a proxy server 14 is provided at the level of the terminal 10 .
- the function of the proxy server 14 is limited to interfacing (repeater function) between the terminal 10 and the card 11 for the IMS application.
- the card 11 can become aware that the proxy server 14 exists by various means, the simplest one being for the terminal 10 to send one piece of information (for example an APDU or through another signalling mechanism) to the card 11 , mentioning the existence of the server 14 . If one application in the card, for example a bank application intended to check a signature, needs to use the channel 12 , it can also request the terminal 10 to open a communication via the proxy 14 .
- one application in the card for example a bank application intended to check a signature, needs to use the channel 12 , it can also request the terminal 10 to open a communication via the proxy 14 .
- the card can become aware of the existence of the proxy by storing information in a file, through one APDU transmitted from the terminal to the card, through a command encapsulated in an IP packet, through an implicit discovery (try-and-error) i.e. the card tries to contact the proxy: if it answers, the service starts, if it does not, the application stops.
- Such commands or solicitations can be directly executed with the proxy or by contacting other contacts in the card conventionally used or new ones (for example a discovery table or a request for a discovery on IP).
- Data sent by the terminal 10 to the proxy 14 (and intended for the card 11 ) is not encrypted by the terminal.
- the contents of the messages which transit as a plain text between the terminal 10 and the card 11 can contain encrypted data.
- the card receives data it processes the data (in the IMS application it contains) and the answer data is then re-encrypted when it is sent back to the terminal 10 via the proxy 14 in non-encrypted SIP messages, except for some application data encrypted by the card. This may, for example, be the encryption of a signature in a bank application.
- the terminal 10 encrypts the whole SIP message to send it to the server 13 .
- the card 11 can thus supply and access secured IMS services without requiring the opening of another IP-SEC channel.
- One alternative solution consists in implementing, on the mobile, a service for discovering the parameters of the security association established between the mobile and the IMS network.
- Such parameters include among other things the list of the encryption algorithms used as well as the numbers of ports to be used for transmitting data.
- Such parameters are typically stored in the mobile in a table which can be accessed by the IMS applications through a programming interface enabling these to use the IP-SEC channel.
- the discovery service shown here can use the same means as those available to the IMS applications.
- FIG. 2 shows a second embodiment of the method according to the invention.
- the proxy 14 in FIG. 1 is replaced by a system of IP battery 20 which serializes the IP packets transmitted and received by the terminal 10 and the card 11 .
- a discovery service can be implemented there too, so that the card 11 can be aware that the system of IP battery 20 exists.
- the packets received from the terminal 10 and from the card 11 are transmitted as soon as possible to the IMS server 13 on an IP-SEC secured connection 21 .
- the same mechanism operates for transmitting the descending IP packets, from the IMS server 13 to the terminal 10 and the card 11 .
- the battery 20 management may be left either to the terminal 10 , or to the card 11 , with the operation being substantially of the FIFO type.
- the battery 20 can physically be accommodated in the terminal 10 or in the card 11 .
- Data received and to be transmitted are decrypted and encrypted locally, i.e. either in the terminal 10 , or in the card 11 .
- the channel 21 conveys enciphered packets only.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- The field of the invention is that of mobile telecommunications systems and more particularly relates to an improvement brought in a standardized architecture known as IMS (IP Multimedia Subsystem).
- IMS architecture makes it possible to supply the users of telecommunications networks of the GSM, GPRS or UMTS types with fixed and mobile multimedia services. This system uses the VoIP (Voice over IP) technology based on a standardized 3GPP implementation of SIP (Session Initiation Protocol) operating in a standard IP (Internet Protocol) protocol.
- IMS architecture supplies an intermediate layer in the core of networks for switching from the conventional mode (circuit mode) to the session mode. In other words, it makes it possible to open several sessions during the same communication. As an illustration, IMS makes it possible to mix multimedia components, for example adding a chat session to video or sending a photograph during a phone call. Starting a video session during a call is also possible, using IMS.
- An IMS connection is conventionally established by the user's mobile terminal. Requesting a data channel from the IMS network establishes a secured IP connection and it is then possible to send and to receive any type of data via this channel.
- The 3GPP TS 33.203 standard discloses the characteristics and the security mechanisms aiming at securing the accesses to an IMS server and more particularly how the SIP signalling is protected between the user-subscriber and the IMS server, how this subscriber is authentified and how the subscriber authentifies the IMS server.
- An IMS-implementing mobile terminal thus establishes a secured channel with the IMS server and protects the communications of data with the server.
- In practice, the IMS server and the subscriber make a mutual authentication and tap keys. Tapped keys are used for establishing a secured channel between the subscriber and the IMS server. The secured channel can be established using an IP-SEC (acronym for IP—secured Internet channel) as described in 3GPP TS 33.203.
- IMS can be operated with any type of networks (fixed, mobile or wireless), including the packets switching functions, such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable. Older circuit switching systems (POTS, GSM) are supported by gateways. Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
- In the current systems, the IMS channel is totally managed by the user's (generally mobile) terminal, typically composed of a portable telephone or a Smartphone (portable telephone coupled with a PDA). The terminal initiates and manages communication on the IMS channel. The terminal switched to the IMS mode has a particularity in that it encrypts the data it sends and decrypts the data it receives from the IMS server. The thus generated physical channel is called an IP-SEC channel.
- In addition, a mobile terminal conventionally includes a card (SIM in a 2G network or UICC with a USIM aboard, in a 3G network) making it possible to authentify the user in the network. The card only plays a part in the authentication and the generation of keys giving access to the IMS networks. But the card, in the present state of the art, has no role to play when the terminal is switched to the IMS mode.
- The drawback of this solution is that, if applications, for example an on-line game application or a bank application (for example enabling to pay with his/her mobile terminal), exist in the card, these cannot use the IMS channel since the access to the IMS network requires an authentication and the information transmitted between the IMS terminal and the card are encrypted. Since appropriate security mechanisms cannot be implemented, the card applications cannot be considered as IMS applications. For example, a user will not be allowed to make a payment from his/her mobile terminal while conversing (through a conventional voice channel) with the shopkeeper, if the payment application is totally implemented in the card.
- One solution to remedy this problem could consist in authorizing the card to establish a new security association, between the card and the IMS network, independent of the one managed by the terminal.
- The drawback of this solution however is that the resources, as regards the infrastructure, are limited to the operator which, in order to enable the users of its telecommunications network to simultaneously operate a first conventional IP-SEC channel through the functions of their mobile terminals and a second IP-SEC channel for application functions (computer programs) accommodated in the cards of such mobile terminals, would theoretically be obliged to adapt its network infrastructure and to increase its capacity. This cannot be considered, from an economical point of view.
- The object of the present invention is to provide solutions making it possible to store and to execute IMS applications in the SIM card.
- More precisely, one object of the present invention is to allow a user to operate the applications existing in the card from his/her mobile terminal, with the data resulting from such (in-coming or out-going) applications transiting between the card and the server via an IP-SEC channel, and thus in IMS mode, without increasing the number of available IP-SEC channels in the network.
- This object, as well as other ones which will appear subsequently, is reached thanks to a method for sharing the resources of the IP-SEC connection established by the terminal. Such resources (i.e. the IP packets emitted toward the IMS server and those received from the server) are shared by the terminal and the card.
- In one preferred embodiment, the sharing of resources is provided by a proxy server aboard the terminal. The proxy can use the SIP language used by the IMS applications.
- In another preferred embodiment, the sharing of resources is provided by a system of the IP battery type serializing the IP packets transmitted and received by the terminal and the card. An application implementing a service for discovering the security parameters used for the connection between the mobile and the IMS network is used in the terminal.
- Other characteristics and advantages of the invention will appear when reading the following description of two advantageous embodiments of the invention, given as an illustration and not as a limitation, and the appended drawings, wherein:
-
FIG. 1 represents a first embodiment of the method according to the invention; -
FIG. 2 represents a second embodiment of the method according to the invention. -
FIG. 1 represents a first embodiment of the method according to the invention. In this embodiment, a proxy server is used as an interface between the terminal and the card. - Knowingly, a proxy is a data server, the function of which consists in relaying requests between two stations (for example, a client station and a server).
- In
FIG. 1 , aterminal 10, typically a mobile telephone terminal has a subscriber'sauthentication card 11, typically an UICC card (acronym for Universal Integrated Circuit Card). Thecard 11 guarantees the integrity and the security of all the types of personal data. Knowingly, it more particularly includes SIM applications in a GSM network and/or USIM applications in a UMTS network. - The
card 11 also conventionally includes a processor, ROM, RAM and EEPROM memories, as well as an I/O interface circuit with theterminal 10. It further includes an ISIM Module (IP Multimedia Services Identity Module). - In operation, the user of the
terminal 10 is in radio communication (voice channel not shown) with another user. Knowingly and as previously disclosed, theterminal 10 is able to request the opening of anIMS channel 12 from anIMS server 13. Thechannel 12 corresponds to the previously mentioned secured IP-SEC channel. For this purpose, theterminal 10 contains one application providing the encryption of data, which it sends to theserver 13 and the decryption of data received by thisserver 13. - According to the invention and in order to enable the applications existing in the
card 11 to take advantage of the existence of the securedchannel 12, aproxy server 14 is provided at the level of theterminal 10. The function of theproxy server 14 is limited to interfacing (repeater function) between theterminal 10 and thecard 11 for the IMS application. - The
card 11 can become aware that theproxy server 14 exists by various means, the simplest one being for theterminal 10 to send one piece of information (for example an APDU or through another signalling mechanism) to thecard 11, mentioning the existence of theserver 14. If one application in the card, for example a bank application intended to check a signature, needs to use thechannel 12, it can also request theterminal 10 to open a communication via theproxy 14. - The card can become aware of the existence of the proxy by storing information in a file, through one APDU transmitted from the terminal to the card, through a command encapsulated in an IP packet, through an implicit discovery (try-and-error) i.e. the card tries to contact the proxy: if it answers, the service starts, if it does not, the application stops. Such commands or solicitations can be directly executed with the proxy or by contacting other contacts in the card conventionally used or new ones (for example a discovery table or a request for a discovery on IP).
- Data sent by the
terminal 10 to the proxy 14 (and intended for the card 11) is not encrypted by the terminal. In order to ensure the protection of end-to-end exchanges (between, for example, the banking application in the card and the remote bank server), the contents of the messages which transit as a plain text between theterminal 10 and thecard 11 can contain encrypted data. When the card receives data, it processes the data (in the IMS application it contains) and the answer data is then re-encrypted when it is sent back to theterminal 10 via theproxy 14 in non-encrypted SIP messages, except for some application data encrypted by the card. This may, for example, be the encryption of a signature in a bank application. Theterminal 10 encrypts the whole SIP message to send it to theserver 13. - The
card 11 can thus supply and access secured IMS services without requiring the opening of another IP-SEC channel. - One alternative solution consists in implementing, on the mobile, a service for discovering the parameters of the security association established between the mobile and the IMS network. Such parameters include among other things the list of the encryption algorithms used as well as the numbers of ports to be used for transmitting data. Such parameters are typically stored in the mobile in a table which can be accessed by the IMS applications through a programming interface enabling these to use the IP-SEC channel. The discovery service shown here can use the same means as those available to the IMS applications.
-
FIG. 2 shows a second embodiment of the method according to the invention. - In this second embodiment, the
proxy 14 inFIG. 1 is replaced by a system ofIP battery 20 which serializes the IP packets transmitted and received by the terminal 10 and thecard 11. A discovery service can be implemented there too, so that thecard 11 can be aware that the system ofIP battery 20 exists. - The packets received from the terminal 10 and from the
card 11 are transmitted as soon as possible to theIMS server 13 on an IP-SEC securedconnection 21. The same mechanism operates for transmitting the descending IP packets, from theIMS server 13 to the terminal 10 and thecard 11. - The
battery 20 management may be left either to the terminal 10, or to thecard 11, with the operation being substantially of the FIFO type. Thebattery 20 can physically be accommodated in the terminal 10 or in thecard 11. - Data received and to be transmitted are decrypted and encrypted locally, i.e. either in the terminal 10, or in the
card 11. - Like
channel 12 inFIG. 1 , thechannel 21 conveys enciphered packets only. - The above description was given as an illustration only and not as a limitation and the person skilled in the art will easily imagine other embodiments of the present invention within the scope of the claims.
Claims (3)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08305766.1 | 2008-10-31 | ||
EP08305766A EP2182696A1 (en) | 2008-10-31 | 2008-10-31 | Method of establishing a link between the applications of a subscriber authentication card and an IMS network |
EP08305766 | 2008-10-31 | ||
PCT/EP2009/063935 WO2010049350A1 (en) | 2008-10-31 | 2009-10-22 | Method for establishing a link between the applications of an authentication card of a subscriber and an ims network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110252140A1 true US20110252140A1 (en) | 2011-10-13 |
US8788670B2 US8788670B2 (en) | 2014-07-22 |
Family
ID=40364280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/126,904 Active 2030-07-07 US8788670B2 (en) | 2008-10-31 | 2009-10-22 | Method for establishing a link between the applications of an authentication card of a subscriber and an IMS network |
Country Status (3)
Country | Link |
---|---|
US (1) | US8788670B2 (en) |
EP (2) | EP2182696A1 (en) |
WO (1) | WO2010049350A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120047237A1 (en) * | 2009-04-16 | 2012-02-23 | Petter Arvidsson | Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element |
US20140010148A1 (en) * | 2010-12-23 | 2014-01-09 | Research In Motion Limited | Card Toolkit Support for IP Multimedia Subsystem |
US10275613B1 (en) * | 2018-04-20 | 2019-04-30 | Capital One Services, Llc | Identity breach notification and remediation |
WO2023005524A1 (en) * | 2021-07-27 | 2023-02-02 | 中兴通讯股份有限公司 | Order payment method and apparatus, and storage medium, device and system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302572B (en) * | 2015-05-15 | 2020-09-22 | Tcl科技集团股份有限公司 | Multi-channel communication method and system between servers |
US11750773B2 (en) | 2021-08-25 | 2023-09-05 | Bank Of America Corporation | Real-time, two-way video authentication system |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5930493A (en) * | 1995-06-07 | 1999-07-27 | International Business Machines Corporation | Multimedia server system and method for communicating multimedia information |
US20020162021A1 (en) * | 2001-04-30 | 2002-10-31 | Audebert Yves Louis Gabriel | Method and system for establishing a remote connection to a personal security device |
US20050149740A1 (en) * | 2003-12-31 | 2005-07-07 | Kotzin Michael D. | Method and apparatus for device authentication |
US20050164738A1 (en) * | 2004-01-26 | 2005-07-28 | Sbc Knowledge Ventures, L.P. | Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal |
US6963740B1 (en) * | 2001-07-31 | 2005-11-08 | Mobile-Mind, Inc. | Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices |
US7076273B2 (en) * | 2002-11-05 | 2006-07-11 | Siemens Aktiengesellschaft | Method for controlling a multimedia messaging service between a telecommunication device and a telecommunication network, respective smart card and telecommunication device |
US20060229090A1 (en) * | 2005-03-07 | 2006-10-12 | Ladue Christoph K | Symbol stream virtual radio organism method & apparatus |
US20070160085A1 (en) * | 2006-01-11 | 2007-07-12 | Infineon Technologies Ag | Method and system for transmitting supplementary data, and communication terminal |
US7281244B2 (en) * | 2003-01-16 | 2007-10-09 | Sun Microsystems, Inc. | Using a digital fingerprint to commit loaded data in a device |
US7421732B2 (en) * | 2003-05-05 | 2008-09-02 | Nokia Corporation | System, apparatus, and method for providing generic internet protocol authentication |
US7484095B2 (en) * | 2003-01-16 | 2009-01-27 | Sun Microsystems, Inc. | System for communicating program data between a first device and a second device |
US20090086740A1 (en) * | 2007-10-01 | 2009-04-02 | General Instrument Corporation | Customer Premises Gateway providing User Devices with Access to Internet Protocol Multimedia Subsystem (IMS) Services and Non-IMS Services |
US7870153B2 (en) * | 2006-01-24 | 2011-01-11 | Citrix Systems, Inc. | Methods and systems for executing, by a virtual machine, an application program requested by a client machine |
US8046824B2 (en) * | 2005-04-11 | 2011-10-25 | Nokia Corporation | Generic key-decision mechanism for GAA |
US8166530B2 (en) * | 2003-04-07 | 2012-04-24 | Research In Motion Limited | Method and system for supporting portable authenticators on electronic devices |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69925732T2 (en) * | 1999-10-22 | 2006-03-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile phone with built-in security firmware |
EP1608123A1 (en) * | 2004-06-15 | 2005-12-21 | Axalto SA | Method and device for communicating HTTP messages with portable devices |
US20080092224A1 (en) * | 2006-10-16 | 2008-04-17 | Motorola, Inc. | Method and apparatus for seamless connections and service continuity in an agnostic access internet protocol multimedia communication system |
-
2008
- 2008-10-31 EP EP08305766A patent/EP2182696A1/en not_active Withdrawn
-
2009
- 2009-10-22 US US13/126,904 patent/US8788670B2/en active Active
- 2009-10-22 WO PCT/EP2009/063935 patent/WO2010049350A1/en active Application Filing
- 2009-10-22 EP EP09744123A patent/EP2347555A1/en not_active Ceased
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5930493A (en) * | 1995-06-07 | 1999-07-27 | International Business Machines Corporation | Multimedia server system and method for communicating multimedia information |
US20020162021A1 (en) * | 2001-04-30 | 2002-10-31 | Audebert Yves Louis Gabriel | Method and system for establishing a remote connection to a personal security device |
US7853789B2 (en) * | 2001-04-30 | 2010-12-14 | Activcard Ireland, Limited | Method and system for establishing a communications pipe between a personal security device and a remote computer system |
US6963740B1 (en) * | 2001-07-31 | 2005-11-08 | Mobile-Mind, Inc. | Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices |
US7076273B2 (en) * | 2002-11-05 | 2006-07-11 | Siemens Aktiengesellschaft | Method for controlling a multimedia messaging service between a telecommunication device and a telecommunication network, respective smart card and telecommunication device |
US7281244B2 (en) * | 2003-01-16 | 2007-10-09 | Sun Microsystems, Inc. | Using a digital fingerprint to commit loaded data in a device |
US7484095B2 (en) * | 2003-01-16 | 2009-01-27 | Sun Microsystems, Inc. | System for communicating program data between a first device and a second device |
US8166530B2 (en) * | 2003-04-07 | 2012-04-24 | Research In Motion Limited | Method and system for supporting portable authenticators on electronic devices |
US7421732B2 (en) * | 2003-05-05 | 2008-09-02 | Nokia Corporation | System, apparatus, and method for providing generic internet protocol authentication |
US20050149740A1 (en) * | 2003-12-31 | 2005-07-07 | Kotzin Michael D. | Method and apparatus for device authentication |
US20050164738A1 (en) * | 2004-01-26 | 2005-07-28 | Sbc Knowledge Ventures, L.P. | Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal |
US20060229090A1 (en) * | 2005-03-07 | 2006-10-12 | Ladue Christoph K | Symbol stream virtual radio organism method & apparatus |
US8046824B2 (en) * | 2005-04-11 | 2011-10-25 | Nokia Corporation | Generic key-decision mechanism for GAA |
US20070160085A1 (en) * | 2006-01-11 | 2007-07-12 | Infineon Technologies Ag | Method and system for transmitting supplementary data, and communication terminal |
US7870153B2 (en) * | 2006-01-24 | 2011-01-11 | Citrix Systems, Inc. | Methods and systems for executing, by a virtual machine, an application program requested by a client machine |
US20090086740A1 (en) * | 2007-10-01 | 2009-04-02 | General Instrument Corporation | Customer Premises Gateway providing User Devices with Access to Internet Protocol Multimedia Subsystem (IMS) Services and Non-IMS Services |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120047237A1 (en) * | 2009-04-16 | 2012-02-23 | Petter Arvidsson | Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element |
US9572025B2 (en) * | 2009-04-16 | 2017-02-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Method, server, computer program and computer program product for communicating with secure element |
US20140010148A1 (en) * | 2010-12-23 | 2014-01-09 | Research In Motion Limited | Card Toolkit Support for IP Multimedia Subsystem |
US9619442B2 (en) | 2010-12-23 | 2017-04-11 | Blackberry Limited | Card toolkit support for IP multimedia subsystem |
US9717063B2 (en) * | 2010-12-23 | 2017-07-25 | Blackberry Limited | Card toolkit support for IP multimedia subsystem |
US10275613B1 (en) * | 2018-04-20 | 2019-04-30 | Capital One Services, Llc | Identity breach notification and remediation |
US11093637B2 (en) | 2018-04-20 | 2021-08-17 | Capital One Services, Llc | Identity breach notification and remediation |
US11822694B2 (en) | 2018-04-20 | 2023-11-21 | Capital One Services, Llc | Identity breach notification and remediation |
WO2023005524A1 (en) * | 2021-07-27 | 2023-02-02 | 中兴通讯股份有限公司 | Order payment method and apparatus, and storage medium, device and system |
Also Published As
Publication number | Publication date |
---|---|
WO2010049350A1 (en) | 2010-05-06 |
EP2182696A1 (en) | 2010-05-05 |
EP2347555A1 (en) | 2011-07-27 |
US8788670B2 (en) | 2014-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10206102B2 (en) | Network access control methods and apparatus | |
US7992212B2 (en) | Mobile terminal and gateway for remotely controlling data transfer from secure network | |
KR101438243B1 (en) | Sim based authentication | |
KR101363981B1 (en) | Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses | |
TWI351888B (en) | Method of providing wireless telecommunication ser | |
US9154955B1 (en) | Authenticated delivery of premium communication services to trusted devices over an untrusted network | |
US20050259673A1 (en) | Method and system for end-to-end communication between a universal integrated circuit card and a remote entity over an IP-based wireless wide area network and the internet | |
US8788670B2 (en) | Method for establishing a link between the applications of an authentication card of a subscriber and an IMS network | |
KR20200022512A (en) | Network security management method and device | |
US8116782B2 (en) | Communication quality control system | |
JP2008518533A (en) | Method and system for transparently authenticating mobile users and accessing web services | |
US10681143B2 (en) | Establishment of a secure connection for a communication session | |
US20090070586A1 (en) | Method, Device and Computer Program Product for the Encoded Transmission of Media Data Between the Media Server and the Subscriber Terminal | |
US9154949B1 (en) | Authenticated delivery of premium communication services to untrusted devices over an untrusted network | |
AU2010329814B2 (en) | Smart card security feature profile in home subscriber server | |
Garcia-Martin | Input 3rd-generation partnership project (3GPP) release 5 requirements on the session initiation protocol (SIP) | |
CN113873510B (en) | Secure communication method, related device and system | |
CN114040385A (en) | VoLTE-based encrypted call system and method | |
EP4072093A1 (en) | Communication method and apparatus | |
CN113382410B (en) | Communication method and related device and computer readable storage medium | |
CN105992205A (en) | Method for sharing WLAN ciphers and device for sharing WLAN ciphers | |
JP5331032B2 (en) | Network call control system | |
KR20070086008A (en) | System, terminal, method, and software for communicating messages | |
US20070124808A1 (en) | System and method for providing bi-directional communication service | |
CN117083893A (en) | First node, second node, third node for handling encrypted traffic in a communication network and method performed by the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GEMALTO SA, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SEIF, JACQUES;GANEM, HERVE;SIGNING DATES FROM 20110420 TO 20110513;REEL/FRAME:026437/0392 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: THALES DIS FRANCE SA, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:GEMALTO SA;REEL/FRAME:064716/0408 Effective date: 20170716 |
|
AS | Assignment |
Owner name: THALES DIS FRANCE SAS, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THALES DIS FRANCE SA;REEL/FRAME:064771/0016 Effective date: 20211215 |